Sciweavers

2612 search results - page 386 / 523
» Switching Graphs and Their Complexity
Sort
View
CGF
2008
98views more  CGF 2008»
14 years 10 months ago
Surface Reconstruction from Unorganized Point Data with Quadrics
We present a reverse engineering method for constructing a surface approximation scheme whose input is a set of unorganized noisy points in space and whose output is a set of quad...
Marek Vanco, Bernd Hamann, Guido Brunnett
CORR
2010
Springer
144views Education» more  CORR 2010»
14 years 10 months ago
Stochastic Games for Security in Networks with Interdependent Nodes
This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take pa...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
DISOPT
2010
132views more  DISOPT 2010»
14 years 10 months ago
General approximation schemes for min-max (regret) versions of some (pseudo-)polynomial problems
While the complexity of min-max and min-max regret versions of most classical combinatorial optimization problems has been thoroughly investigated, there are very few studies abou...
Hassene Aissi, Cristina Bazgan, Daniel Vanderpoote...
IJAC
2008
97views more  IJAC 2008»
14 years 10 months ago
Random Generation of Finitely Generated Subgroups of a Free Group
We give an efficient algorithm to randomly generate finitely generated subgroups of a given size, in a finite rank free group. Here, the size of a subgroup is the number of vertic...
Frédérique Bassino, Cyril Nicaud, Pa...
IJNSEC
2008
75views more  IJNSEC 2008»
14 years 10 months ago
A Key Management Scheme for Hierarchical Access Control in Group Communication
In group communication, users often have different access rights to multiple data streams. Based on the access relation of users and data streams, users can form partially ordered...
Qiong Zhang, Yuke Wang, Jason P. Jue